Sciweavers

4286 search results - page 753 / 858
» Formalizing Service Interactions
Sort
View
109
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
COMPSAC
2008
IEEE
15 years 10 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
ICC
2008
IEEE
146views Communications» more  ICC 2008»
15 years 10 months ago
APOS: Adaptive Parameters Optimization Scheme for Voice over IEEE 802.11g
—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
140
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
111
Voted
NOMS
2008
IEEE
15 years 10 months ago
Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
—The need for collaborative service provisioning across different providers’ domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and...
Latifa Boursas, Vitalian A. Danciu